In the vast expanse of today’s digital landscape, passwords have evolved into much more than mere combinations of characters. They are the virtual keys that unlock the doors to our online identities, granting access to everything from social media profiles to online banking. However, the ubiquity of passwords has led to an increasingly complex and daunting challenge – how to manage them securely and effectively?

As our digital lives expand, so do the number of passwords we manage. Each account demands its own unique, strong password to fend off potential cyber threats, and unless you are re using the same password repeatedly (which you shouldn’t!) then that leaves the average person a staggering 70 – 80 passwords in their digital archives. 

Where do you store these critical credentials? It might come as a surprise that a significant number of individuals still write down their passwords on sticky notes affixed to their monitors or on scraps of paper within their desk drawers. While this approach might appear as a convenient solution, it effectively exposes them to a range of digital vulnerabilities. 

Introducing Password Managers:

A password manager is a specialised software tool designed to securely store and organise your login credentials, including usernames and passwords, for different online accounts and services. It offers a centralised and encrypted vault where users can save their authentication information, eliminating the need to remember those 70 – 80 passwords.

By generating strong, unique passwords for each account and storing them in an encrypted database, password managers enhance security by mitigating the risks of using weak passwords or reusing them across multiple platforms. Users typically access their stored credentials through a master password or biometric authentication, adding an additional layer of protection. This technology not only simplifies the process of managing passwords but also contributes significantly to bolstering overall online security.

They not only house your valuable credentials but also possess the capacity to combat undesirable assaults like phishing. The complexity of phishing attacks has grown, ensnaring even the most vigilant users. Password managers assume a crucial function in this struggle, often incorporating anti-phishing capabilities. These tools examine websites before automatically inputting your credentials, effectively blocking endeavours by malicious sites to pilfer your information. 

According to a recent investigation conducted by Security.org, it was found that individuals lacking a reliable password manager encountered instances of identity theft at a rate three times higher than those who used them appropriately.

Embrace the Protection of Password management:

The importance of password managers cannot be overstated in an age where cyber threats are constant. By integrating a reputable password manager into your online routine, you are taking a proactive stance to fortify your digital world.
With robust security features, simplified management, and enhanced protection against cyber threats, password managers stand as the gleaming defenders of your online security.
Safeguard your digital realm – your personal data and peace of mind deserve nothing less.

Are you ready for your business to become better protected?
Phone us today on 1300 267 747 to learn more about our choice for password Management.

With technology permeating every aspect of our lives, from personal communication to business operations, the protection of sensitive information and systems has become paramount. As a result, businesses face the challenge of how to safeguard their digital assets.

The answer to this pressing challenge lies in the realm of cyber security. By implementing robust cyber security measures, businesses can fortify their defences and mitigate the risks posed by cyber threats. Cyber security encompasses a comprehensive approach that includes proactive measures such as risk assessments, vulnerability scanning, and penetration testing, as well as reactive measures like incident response and recovery planning.

In this blog post, we will explore some frequently asked questions about cyber security, shedding light on its significance and providing essential insights to help you navigate the digital landscape securely.

So, why is Cyber Security so important?
Cyber security is crucial to a business for several key reasons.
It protects sensitive information, such as customer data and financial records, from unauthorised access and theft. By ensuring the confidentiality of this information, businesses can maintain trust with their customers and partners.
Cyber security safeguards a business’s reputation. A data breach or attack can result in significant damage to a company’s brand image and customer trust. By implementing effective cyber security measures, you can help mitigate financial losses associated with remediation, recovery, legal actions, and regulatory fines.
Robust Security protects against the constantly evolving threat landscape, allowing businesses to stay ahead of emerging threats and adapt to new attack vectors.

Ai Art Instagram Post (2240 × 1260px) (9)

What are some common types of Cyber threats?
When it comes to cybersecurity, understanding the common types of cyber threats is essential for protecting yourself and your organisation. Here are some notable examples:

Malware: Malicious software, such as viruses, worms, trojans, ransomware, and spyware, is designed to infiltrate computer systems, steal sensitive information, or cause damage.
Phishing: Phishing attacks involve cybercriminals posing as trustworthy entities to deceive individuals into revealing sensitive information, like passwords or credit card details, through deceptive emails or websites.
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks: These attacks overload networks, servers, or websites with a flood of traffic, rendering them inaccessible to legitimate users.
Social Engineering: Cybercriminals exploit human psychology to manipulate individuals into sharing confidential information or granting unauthorised access. Tactics include impersonation, pretexting, baiting, or creating a sense of urgency.
SQL Injection: Attackers exploit vulnerabilities in web applications by injecting malicious SQL code, potentially gaining unauthorised access to databases, or manipulating data.
Man-in-the-Middle (MitM) Attacks: Cybercriminals intercept and alter communications between two parties, enabling them to eavesdrop, modify, or steal sensitive information transmitted over networks.
Password Attacks: Techniques like brute-force attacks or dictionary attacks are used to crack or guess passwords, providing unauthorised access to systems or accounts.
Zero-day Exploits: These attacks take advantage of previously unknown vulnerabilities in software or systems, leaving organisations vulnerable until the vulnerability is discovered and patched.

How Can Businesses Safeguard their Assets?
It’s quite simple..
As a business owner cyber security should be your utmost priority.
Underestimating the significance of a Managed Service Provider and their role as a fundamental pillar of success in your business would be a mistake.

What criteria should I consider when choosing a Managed Service Provider?
Evaluate their expertise and experience in providing managed services, specifically in the areas relevant to your business needs.
Assess the range of services offered and their ability to customise solutions to fit your requirements. Look for strong security technologies and tools, along with a proven incident response and management approach.
Consider their reputation, client references, and compliance expertise. Additionally, review their service level agreements and balance the cost with the value provided.
By carefully evaluating these criteria, you can choose an MSP that aligns with your business objectives and ensures reliable and effective managed services.
For more information about anspired, and the Managed Service we provide, visit our website at www.anspired.com.au.

Ai Art Instagram Post (2240 × 1260px) (8)

What Role Does Artificial Intelligence (AI) Play in Cyber Security?
AI-powered systems can analyse vast amounts of data in real-time, identifying patterns, anomalies, and potential threats that may go unnoticed by traditional security measures.
Machine learning algorithms enable AI to learn from previous attacks and adapt its defenses accordingly, continuously improving its ability to detect and mitigate emerging threats.
AI also helps automate security processes, enabling faster response times and reducing the workload on human security professionals.
By harnessing the power of AI, organisations can strengthen their cybersecurity posture and stay one step ahead of cybercriminals.

In conclusion, cyber security is an indispensable aspect of modern business operations. Implementing robust measures, understanding common threats, and leveraging Artificial Intelligence can strengthen defenses and safeguard valuable assets in the ever-evolving digital landscape. Prioritising cyber security is not just a necessity, but a strategic imperative for organisations aiming to protect sensitive information, maintain trust, and stay ahead of emerging threats.

Are you in search of dependable Cyber Secuirty and IT Support? 
Look no further than anspired, Australia’s #1 Protected Services Provider. 

Contact us today to learn more.

 

www.anspired.com.au
1300 267 747.

Businesses are facing an ever-increasing number of cyber threats that can compromise sensitive data, disrupt operations, and damage reputation. While investing in robust technical solutions is essential, it is equally crucial to foster a resilient cybersecurity culture within the organisation. By empowering employees to actively participate in protecting the business, organisations can create a formidable line of defence against cyber threats.
In this blog, we will delve into the importance of building a resilient cybersecurity culture and provide actionable strategies for empowering employees to safeguard your business.

So, how can we empower employees for cybersecurity success?

Leadership Commitment: Setting the Tone for Cybersecurity Excellence
• Highlighting the importance of leadership commitment in prioritising cybersecurity initiatives and allocating resources effectively. 

Education and Training: Equipping Employees with Essential Knowledge
• Developing comprehensive training programs tailored to employees’ roles and responsibilities. 
• Educating employees about common cyber threats, data protection best practices, and their role in safeguarding the organisation. 

Clear Policies and Procedures: Establishing Guidelines for Cybersecurity
• Implementing Crafting concise cybersecurity policies and procedures to provide clarity and reinforce employee responsibilities. 

Ai Art Instagram Post (2240 × 1260px) (5)

Promoting Security Awareness and Ownership
• Regularly communicating with employees about the latest cyber threats, emerging trends, and security updates.
• Enhancing employees’ ability to recognise and avoid phishing attacks through targeted awareness campaigns.
• Emphasising the importance of strong and unique passwords while promoting the use of password managers.

Creating a Secure Work Environment
• Securing remote work setups, including home networks, with best practices such as VPNs and multifactor authentication.
• Encouraging employees to report any suspicious activities or incidents promptly to ensure early detection and response.
• Conducting regular security assessments and audits to identify vulnerabilities and implement necessary remediation measures.

Recognition and Incentives
• Implementing employee recognition programs to acknowledge exemplary cybersecurity practices.
• Providing continuous learning opportunities to keep employees updated on the latest cybersecurity trends and technologies.

Building a resilient cybersecurity culture is a continuous journey that requires collective effort and a proactive approach. By implementing the strategies discussed in this blog and empowering employees to become active defenders of your organisation’s security, you can create a strong line of defence against cyber threats.

Remember, cybersecurity is not just the responsibility of the IT department; it is a shared responsibility across the entire organisation.
By fostering a culture of cybersecurity awareness, providing comprehensive training, promoting open communication, and recognising employees’ contributions, you can create a workforce that is equipped to protect your business from evolving threats.

Together, let’s embrace the power of employee empowerment and ensure a secure and resilient future for our organisations.

In the realm of Cybersecurity, understanding various terminologies and tech jargon is crucial for individuals and businesses alike. With Cyber threats becoming increasingly more sophisticated, staying informed about a Cybersecurity terminology can help navigate the complex landscape of the digital world. 
In this blog post, our mission is to unravel the complexities of common cybersecurity terms, equipping you with a comprehensive guide that will enhance your understanding and empower you to outsmart potential hackers.

Here is a breakdown of these 10 commonly used terms: 

  1. Malware: 
    Malware, short for malicious software, refers to any software specifically designed to disrupt, damage, or gain unauthorized access to computer systems or networks. Common types of malwares include viruses, worms, Trojans, ransomware, and spyware.

  2. Phishing: 
    Phishing is a cyber-attack technique where attackers masquerade as a trustworthy entity to deceive individuals into revealing sensitive information, such as login credentials, financial details, or personal data. Phishing attacks are typically carried out through deceptive emails, instant messages, or fake websites.

  3. Firewall: 
    A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between internal networks and the external Internet, preventing unauthorised access and protecting against potential threats.

  4. Encryption: 
    Encryption is the process of encoding data or information in a way that only authorised parties can access and understand it. It involves converting plaintext into ciphertext using encryption algorithms, ensuring that data remains secure even if intercepted by unauthorised individuals.

  5. Vulnerability: 
    A vulnerability refers to a weakness or flaw in a system’s design, configuration, or implementation that could be exploited by cyber attackers. Vulnerabilities can exist in software, hardware, or network infrastructure, and it is essential to identify and patch them to minimise the risk of exploitation.

  6. Two-Factor Authentication (2FA): 
    Two-Factor Authentication adds an extra layer of security to the authentication process by requiring users to provide two separate forms of identification. This typically involves something the user knows (e.g., a password) and something the user possesses (e.g., a unique code sent to their mobile device).

  7. Botnet:
    A botnet is a network of computers or devices that have been infected with malicious software, known as bots or zombies, and are under the control of a remote attacker. These compromised devices are typically interconnected through the internet and can be harnessed by the attacker to carry out various malicious activities without the knowledge or consent of the device owners. The attacker can remotely command the botnet to perform tasks such as launching distributed denial-of-service (DDoS) attacks, sending spam emails, spreading malware, stealing sensitive information, or participating in other illicit activities. Detecting and dismantling botnets requires advanced security measures from cybersecurity professionals. 

  8. DDoS Attack: 
    A Distributed Denial of Service (DDoS) attack is an attempt to disrupt the normal functioning of a network, service, or website by overwhelming it with a flood of incoming traffic. This surge in traffic, often from multiple sources, consumes the target’s resources and makes it inaccessible to legitimate users.

  9. Intrusion Detection System (IDS) and Intrusion Prevention System (IPS): 
    An Intrusion Detection System (IDS) is a security tool that monitors network traffic and system events to detect and respond to potential security incidents or attacks. An Intrusion Prevention System (IPS) goes a step further by actively blocking and preventing suspicious or malicious activity from reaching its target.

  10. Keylogger:
    A type of malware that records keystrokes made by a user, capturing sensitive information such as login credentials, credit card details, or other confidential data.

Gaining familiarity with cybersecurity terminology is an important step towards bolstering your digital defences. By understanding the language used in the world of cybersecurity, you can make informed decisions, adopt best practices, and communicate effectively with cybersecurity professionals. With the ever-evolving threat landscape, staying knowledgeable about cybersecurity terminology empowers individuals and organizations to protect themselves against emerging cyber threats and ensure a safer digital environment.

www.anspired.com.au
1300 267 747.

Digital transformation has become an essential part of business strategy in today’s fast-paced and ever-evolving technological landscape. It refers to the integration of digital technologies into all aspects of a business, leading to significant changes in how the business operates and delivers value to customers. With the increasing demand for digital experiences and services, it is becoming more important than ever for businesses to adopt digital transformation to stay ahead of the game.

In this blog, we’ll explore why digital transformation is crucial for businesses and how they can implement it to improve efficiency, enhance customer experience, and gain a competitive edge.

Why is digital transformation important?

One key reason is that it enhances the customer experience. By leveraging digital technologies, a business can provide a personalised and seamless experiences across multiple channels, leading to increased customer satisfaction, loyalty, and retention.
By embracing digital technologies, companies can innovate faster, respond to market changes more quickly, and deliver superior experiences. This can give them an edge over their competitors, helping them to increase profitability. With digital technologies in place, organisations can adapt quickly to changing market conditions and emerging trends. They can also leverage these technologies to explore new business models, products, and services that meet evolving customer needs and preferences.

Ai Art Instagram Post (2240 × 1260px) (2)

How to implement digital transformation?

While it can seem daunting, there are several steps that businesses can take to successfully implement it:

  1. Develop a digital strategy:
    Developing a digital strategy is a critical first step before embarking on any digital transformation initiatives. It involves a systematic approach to identifying and defining business objectives and determining how digital technologies can help achieve those objectives. This process should involve a deep understanding of your business operations, the market landscape, and your customer needs and expectations.

    A well-planned digital strategy considers both the short-term and long-term goals of the organisation, taking into account the competitive landscape, potential disruptions, and emerging technologies. The strategy should be flexible and adaptable to change, as the digital landscape is constantly evolving.

  2. Embrace cloud computing:
    Embracing cloud computing is an essential step towards achieving successful digital transformation. Cloud computing has revolutionised the way businesses operate by enabling them to access a range of powerful tools and services that would otherwise be out of reach due to the cost of hardware and infrastructure.
    It also provides businesses with increased agility, as they can quickly and easily adapt to changing market conditions, customer needs, and emerging technologies. This is particularly important in today’s rapidly changing digital landscape, where businesses need to be agile and responsive to stay ahead of the competition.

  3. Automation:
    By automating repetitive tasks, businesses can free up resources and enable their employees to focus on more strategic tasks. This increases efficiency, productivity, and allows businesses to operate more competitively in the digital marketplace.
    Automation also reduces the risk of human error, which can be costly and time-consuming to correct. Automated processes are reliable and consistent, ensuring that tasks are completed accurately and on time. This can improve customer satisfaction and enhance the overall customer experience.

  4. Implement data analytics:
    Data analytics is essential for businesses to gain insights into their operations and make data-driven decisions. By leveraging data analytics, businesses can identify areas for improvement and optimise their operations to enhance efficiency and performance.

  5. Employ qualified individuals:
    Investing in the right talent is a crucial element of successful digital transformation. Digital technologies are constantly evolving, and businesses need to have the right people in place to develop and implement digital strategies, as well as to maintain and support the digital infrastructure. Hiring and developing the right talent can be a challenge for many businesses, particularly in industries where digital skills are in high demand. One approach that businesses can take is to partner with educational institutions or training programs to develop a pipeline of digital talent.

 

To sum up, in today’s business world, digital transformation is no longer a choice but a necessity to remain competitive. By embracing digital technologies and optimising their operations, businesses can enhance customer experience, improve efficiency, and gain an edge in the marketplace. With a well-planned digital strategy, appropriate investments, and skilled talent in place, businesses can successfully execute digital transformation and flourish in the current digital landscape. In conclusion, digital transformation is imperative for businesses to thrive and stay ahead of the game.

www.anspired.com.au
1300 267 747.

2022 showed us there has been an increase in the number and severity of cyber-attacks.
These attacks are becoming more sophisticated, and are causing more damage to individuals, organisations, and governments. They are also becoming more targeted, with attackers focusing on specific industries. This has led to an increase in the need for better cybersecurity measures and practices to protect against these threats.

For Australian business, medium sized enterprises had the highest economic loss per report. The Australian Cyber Security Centre (ACSC) reported an average monetary loss of $88,407 per organisation.

“Between July & December 2021, there were 464 notified data breaches in Australia. 55% of these were criminal breaches.”
– anspired COO, Leon Black.

Whilst there is no guaranteed solution in preventing a cyber security occurrence, there are certain strategies your organisation can implement to significantly reduce its risk and protect its sensitive data.

So, what is the Essential 8?

The Essential Eight is a comprehensive set of strategies that address common vulnerabilities that are exploited by cyber criminals and are considered essential for protecting an organisation’s network and data. These strategies are:

Application Control
This technique is designed to block the execution of malicious software and unapproved or unknown applications, which can be a significant source of security threats.

Application control can be implemented on a wide range of devices, including servers, desktops, laptops, and mobile devices, and it is a crucial step in protecting against unknown and malicious software.

Patching Applications
Patching refers to the process of updating software to fix known vulnerabilities or bugs. Attackers can exploit these vulnerabilities to gain unauthorised access to a system or steal sensitive information. It is important to keep all software up to date, including not only the operating system but also applications such as web browsers, email clients, and office suites.

Configure Microsoft Office macro settings
Macros are small programs that can automate repetitive tasks in Microsoft Office applications. However, they can also be used by attackers to deliver malware or perform malicious actions on a victim’s computer.
In Microsoft Office, macro settings can be configured through the Trust Centre, allowing you to control settings such as disabling macros, setting a security level, and creating a list of trusted sources.

User application hardening
This can be achieved by removing unnecessary features and functions, disabling insecure options, and implementing security controls such as input validation and error handling.
Hardening can be applied to a wide range of applications including web browsers, email clients, office applications, and even mobile applications. 
For example, in email clients, disabling the preview pane and configuring spam filters can help to prevent phishing attacks.

Restrict Administrative Privileges
The strategy involves limiting the number of users who have administrative access to a system and ensuring that only authorised users with a valid business need have access to sensitive data. This can be achieved by implementing the principle of least privilege, which ensures that users are only given the minimum level of access required to perform their job duties.
Implementing this strategy can help reduce the risk of a cyber-attack by limiting the potential damage that can be caused by a compromised account, and by making it more difficult for attackers to gain access to sensitive data and systems.

Patch operating systems
This refers to the process of updating the software of the operating system to fix known vulnerabilities or bugs.
Attackers can exploit these vulnerabilities to gain unauthorised access to a system or steal sensitive information. It is important to keep the operating system up to date to ensure that the latest security patches and updates are installed.

Multi-factor authentication
Multi-factor authentication (MFA) is a security technique that requires the use of multiple forms of authentication to gain access to a system or application. This technique is designed to provide an additional layer of security to traditional username and password-based authentication. MFA is an effective way to improve the security of systems and applications by requiring multiple forms of authentication, and it is considered a best practice in cybersecurity.

Regular backups
Regular backups are a strategy to protect data by creating a copy of it, in case of data loss, deletion, corruption or a cyber-attack. It is important to establish a regular schedule for creating backups, such as daily or weekly, to ensure that the most recent version of the data is saved and available.
Regular backups are an essential part of a comprehensive data protection strategy, and they can help organizations to quickly recover from cyber-attacks and minimize the impact of data breaches.

How can you better understand if your business is implementing these strategies?

The Essential 8 Maturity Model has been designed to provide organisations with a clear understanding of their current level of maturity, identify areas for improvement, develop a plan to achieve a higher level of maturity and better protect their systems and data from cyber threats.

The model has four levels of maturity:

Level 1 – Ad Hoc:
The organisation has some awareness of the Essential 8 strategies, but they are not implemented consistently or effectively.

Level 2 – Basic:
The organisation has implemented some of the Essential 8 strategies, but they are not fully integrated into their security practices.

Level 3 – Intermediate:
The organisation has implemented most of the Essential 8 strategies and has integrated them into their security practices, but there are still areas for improvement.

Level 4 – Advanced:
The organisation has fully implemented all the Essential 8 strategies and has integrated them into their security practices. They continuously monitor, review, and improve their security posture.

How can anspired help?

anspired can provide you with expertise, resources, and technology to implement the Essential 8 strategies and provide ongoing security management and monitoring.

Overall, the Essential Eight is a comprehensive set of strategies that address common vulnerabilities that are exploited by cyber criminals and can be implemented quickly and easily without requiring significant resources. These strategies when followed can help organisations to better protect their systems and data from cyber threats.

Are you ready for your business to become better protected?
Phone us today on 1300 267 747.

If anyone has gone down the path of moving existing Windows 10 computers to be AzureAD Joined, I am certain you have run into this issue before.

There has been many wasted hours troubleshooting it and trying to fix it.

Azure AD join error code 8018000a – This device is already enrolled

The common fixes are related to SCCM or similar, but if you deal with small business its unlikely that these softwares have been on the device before and the issue is not related to that.

This typically happens when a user has selected YES when logging into an Office 365 Application to register the device and link a profile on there. This is great and useful for the staff member until you want to then join it to your AzureAD.

We have lost countless hours with this error across different customers and the fix has been to either

  1. Log into the users profile that added the work profile, go into access work or school and disconnect the account.
    This is horrible and sucks if multiple people use that computer
  2. Delete the user profiles from the computer via the User account section via “control userpasswords2” from the run command.
    An option, but then you also lose all the user accounts and info on the computer

After many lost hours, we have finally found a solution to this problem. We have found the relevant information that has the device linked up and have created an easy  powershell script to clear out the information for you WITHOUT deleting any user accounts/profiles and allow you to get the device AzureAD Joined.

Where is the info stored?

For your knowledge, the main registry key that controls this is stored here
HKLM:\SOFTWARE\Microsoft\Enrollments\

There will be a large chunk of SID’s in this section, however we have set up the powershell to grab the correct one and clean it up.
The second place is in scheduled tasks. We also need to clean up its tasks and remove the folder.

\Microsoft\Windows\EnterpriseMgmt\<SID>

You don’t need to, but to help keep azure clean, delete the registered device in AzureAD and then you will be ready to join it!

The Fix!

I have shared the powershell script below that we have created. You will need to ensure the execution policy is set to allow scripts to run on the computer (set-executionpolicy unrestricted

Simply copy the powershell script below and save it. It needs to be run from a powershell as administrator prompt.

##This script checks for devices registered to AzureAD and removes them so you can successfully perform an AzureAD join. 
# We recommend you backup your registry prior to running. We take no responisbility for the use of this script.



$sids = Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\EnterpriseResourceManager\Tracked' -name |where-object {$_.Length -gt 25}


Foreach ($sid in $sids){

Write-host "Found a registered device. Would you like to remove the device registration settings for SID: $($sid)?" -ForegroundColor Yellow 
    $Readhost = Read-Host " ( y / n ) " 
    Switch ($ReadHost) 
     { 
       Y {Write-host "Yes, Remove registered device"; $removedevice=$true} 
       N {Write-Host "No, do not remove device registration"; $removedevice=$false} 
       Default {Write-Host "Default, Do not remove device registration"; $removedevice=$false} 
     } 


if ($removedevice -eq $true) {

$enrollmentpath = "HKLM:\SOFTWARE\Microsoft\Enrollments\$($sid)"
$entresourcepath = "HKLM:\SOFTWARE\Microsoft\EnterpriseResourceManager\Tracked\$($sid)"


##Remove device from enrollments in registry

$value1 = Test-Path $enrollmentpath
If ($value1 -eq $true) {

write-host "$($sid) exists and will be removed"

Remove-Item -Path $enrollmentpath -Recurse -confirm:$false
Remove-Item -Path $entresourcepath -Recurse -confirm:$false


} 
Else {Write-Host "The value does not exist, skipping"}



##Cleanup scheduled tasks related to device enrollment and the folder for this SID


Get-ScheduledTask -TaskPath "\Microsoft\Windows\EnterpriseMgmt\$($sid)\*"| Unregister-ScheduledTask -Confirm:$false


$scheduleObject = New-Object -ComObject Schedule.Service
$scheduleObject.connect()
$rootFolder = $scheduleObject.GetFolder("\Microsoft\Windows\EnterpriseMgmt")
$rootFolder.DeleteFolder($sid,$null)

Write-Host "Device registration cleaned up for $($sid). If there is more than 1 device registration, we will continue to the next one."
pause


} else { Write-host "Removal has been cancelled for $($sid)"}


}


write-host "Cleanup of device registration has been completed. Ensure you delete the device registration in AzureAD and you can now join your device."


I really hope this has helped you.
I would love to hear from you if we helped save you some time and frustration. Reach out to me on Linkedin https://www.linkedin.com/in/leon-black/